Automation of recon process for ethical hackers

VR Saraswathi, IS Ahmed, SM Reddy… - … for Advancement in …, 2022 - ieeexplore.ieee.org
The need for Recon automation is rapidly increasing as ethical hackers are being lazy in
performing every little check manually. So as to make the Recon process (Info gathering …

An empirical study: automated subdomain takeover threat detection

Y Wang, Z Li, T Wu, I Duncan… - … Conference on Cyber …, 2021 - ieeexplore.ieee.org
Due to the development of E-commerce, phishing attacks are one of the major current cyber
threats. Phishing attacks have become increasingly sophisticated and have exploited both …

Mitigating phishing threats

Y Wang - 2023 - research-repository.st-andrews.ac …
Due to the rapid development of the Internet, modern daily behaviour has become more
efficient and convenient. The Internet has become an indispensable element in our daily life …

Detecting Subdomain TakeOver Threats and Real-Time Alerting for Rapid Response

M Biswas, SP Singh, SK Shaha - 2023 26th International …, 2023 - ieeexplore.ieee.org
In today's cyber landscape, the expansion of online services and applications has
introduced a critical concern cyber security threats, such as subdomain takeovers. These …

Bug Bounty Recon Automation Using Bash Scripting

R Kaur, A Chanda, A Gupta, M Das… - Available at SSRN …, 2023 - papers.ssrn.com
Bug bounty programs are an effective way for companies to discover and address potential
security vulnerabilities in their systems. As part of these programs, security researchers use …

Consolidating reconnaissance tools and techniques for penetration testing under a single platform

MR Gadekar - 2023 - norma.ncirl.ie
The reconnaissance stage of penetration testing could be greatly enhanced by integrating
several reconnaissance tools and techniques into a single platform. This may also result in a …

[PDF][PDF] Automation of Recon Process for Ethical Hackers

IA Sk - researchgate.net
The need for Recon automation is rapidly increasing as ethical hackers are being lazy in
performing every little check manually. So as to make the Recon process (Info gathering …

[PDF][PDF] Automation of Recon process for Ethical Hackers

S Akshay, IA Sk, S Reddy, S Reddy - researchgate.net
The need for Recon automation is rapidly increasing as ethical hackers are being lazy in
performing every little check manually. So as to make the Recon process (Info gathering …

[PDF][PDF] Терро Моайад

T Moayad - naukaru.ru
Аннотация В сфере современной разработки программного обеспечения конвейеры
непрерывной интеграции и непрерывного развертывания (CI/CD) служат …